A Developer’s Guide to Same-Origin Policy (SOP) and Cross-Origin Resource Sharing (CORS) Post date July 14, 2025 Post author By Marouane Post categories In access-control-allow-origin, cors-in-express.js, cross-origin-request-blocked, cross-origin-resource-sharing, same-origin-policy, sop-vs-cors, web-application-security, web-development
JWT vs PASETO: What’s the Best Tool for Generating Secure Tokens? Post date January 9, 2025 Post author By Josson Paul Post categories In authentication-tokens, json-web-token, jwt, jwt-vs-paseto, paseto, platform-agnostic-security, token-security, web-application-security
A Deep Dive into Path Traversal Vulnerabilities Post date June 30, 2024 Post author By hackernoon Post categories In how-path-traversal-works, path-traversal-attacks, secure-web-applications, server-side-security, url-encoding-tricks, web-app-penetration-testing, web-application-security, web-security
4 Reasons To Learn Ethical Hacking Post date April 16, 2021 Post author By Abeshek_AntWak Post categories In career-in-cyber-security, careers, cybersecurity, ethical-hacker, ethical-hacking, network-security, security-testing, web-application-security